A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement

Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of computer security 2021-01, Vol.29 (4), p.423-446
Hauptverfasser: Alam, Md Morshed, Wang, Weichao
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 446
container_issue 4
container_start_page 423
container_title Journal of computer security
container_volume 29
creator Alam, Md Morshed
Wang, Weichao
description Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.
doi_str_mv 10.3233/JCS-200108
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2542457410</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2542457410</sourcerecordid><originalsourceid>FETCH-LOGICAL-c259t-9ae8a2e28a7df473a5299c85c6ead9514ea69a4b04c5d82ccc58fe781c43472d3</originalsourceid><addsrcrecordid>eNotkEtLAzEUhYMoWB8bf0HAnRBNMkkncVeKj0rBRSu4G66ZO3RKm4xJpjD_3il1deCcw72Hj5A7wR8LWRRPH_MVk5wLbs7IRJhSM2OlOicTbuWUSVl-X5KrlLacSyGsmZBhRl3YdxE36FN7QJr6eMCBBk9ryEC7GA7owTt8pqsMGVloWN4gg5gpdGMMboOJgq_paLeR1tjtwrBHnxNtQqSLsKYJXR_bPFD0o-XwmN6QiwZ2CW__9Zp8vb6s5-9s-fm2mM-WzEltM7OABiRKA2XdqLIALa11RrspQm21UAhTC-qHK6drI51z2jRYGuFUoUpZF9fk_nR33PrbY8rVNvTRjy8rqZVUulSCj62HU8vFkFLEpupiu4c4VIJXR7TViLY6oS3-AHXJbcY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2542457410</pqid></control><display><type>article</type><title>A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement</title><source>Business Source Complete</source><creator>Alam, Md Morshed ; Wang, Weichao</creator><creatorcontrib>Alam, Md Morshed ; Wang, Weichao</creatorcontrib><description>Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.</description><identifier>ISSN: 0926-227X</identifier><identifier>EISSN: 1875-8924</identifier><identifier>DOI: 10.3233/JCS-200108</identifier><language>eng</language><publisher>Amsterdam: IOS Press BV</publisher><subject>Comparative studies ; Data analysis ; Data management ; Information management ; State-of-the-art reviews</subject><ispartof>Journal of computer security, 2021-01, Vol.29 (4), p.423-446</ispartof><rights>Copyright IOS Press BV 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c259t-9ae8a2e28a7df473a5299c85c6ead9514ea69a4b04c5d82ccc58fe781c43472d3</citedby><cites>FETCH-LOGICAL-c259t-9ae8a2e28a7df473a5299c85c6ead9514ea69a4b04c5d82ccc58fe781c43472d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Alam, Md Morshed</creatorcontrib><creatorcontrib>Wang, Weichao</creatorcontrib><title>A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement</title><title>Journal of computer security</title><description>Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.</description><subject>Comparative studies</subject><subject>Data analysis</subject><subject>Data management</subject><subject>Information management</subject><subject>State-of-the-art reviews</subject><issn>0926-227X</issn><issn>1875-8924</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNotkEtLAzEUhYMoWB8bf0HAnRBNMkkncVeKj0rBRSu4G66ZO3RKm4xJpjD_3il1deCcw72Hj5A7wR8LWRRPH_MVk5wLbs7IRJhSM2OlOicTbuWUSVl-X5KrlLacSyGsmZBhRl3YdxE36FN7QJr6eMCBBk9ryEC7GA7owTt8pqsMGVloWN4gg5gpdGMMboOJgq_paLeR1tjtwrBHnxNtQqSLsKYJXR_bPFD0o-XwmN6QiwZ2CW__9Zp8vb6s5-9s-fm2mM-WzEltM7OABiRKA2XdqLIALa11RrspQm21UAhTC-qHK6drI51z2jRYGuFUoUpZF9fk_nR33PrbY8rVNvTRjy8rqZVUulSCj62HU8vFkFLEpupiu4c4VIJXR7TViLY6oS3-AHXJbcY</recordid><startdate>20210101</startdate><enddate>20210101</enddate><creator>Alam, Md Morshed</creator><creator>Wang, Weichao</creator><general>IOS Press BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20210101</creationdate><title>A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement</title><author>Alam, Md Morshed ; Wang, Weichao</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c259t-9ae8a2e28a7df473a5299c85c6ead9514ea69a4b04c5d82ccc58fe781c43472d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Comparative studies</topic><topic>Data analysis</topic><topic>Data management</topic><topic>Information management</topic><topic>State-of-the-art reviews</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alam, Md Morshed</creatorcontrib><creatorcontrib>Wang, Weichao</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of computer security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alam, Md Morshed</au><au>Wang, Weichao</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement</atitle><jtitle>Journal of computer security</jtitle><date>2021-01-01</date><risdate>2021</risdate><volume>29</volume><issue>4</issue><spage>423</spage><epage>446</epage><pages>423-446</pages><issn>0926-227X</issn><eissn>1875-8924</eissn><abstract>Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.</abstract><cop>Amsterdam</cop><pub>IOS Press BV</pub><doi>10.3233/JCS-200108</doi><tpages>24</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0926-227X
ispartof Journal of computer security, 2021-01, Vol.29 (4), p.423-446
issn 0926-227X
1875-8924
language eng
recordid cdi_proquest_journals_2542457410
source Business Source Complete
subjects Comparative studies
Data analysis
Data management
Information management
State-of-the-art reviews
title A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T14%3A32%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20comprehensive%20survey%20on%20data%20provenance:%20State-of-the-art%20approaches%20and%20their%20deployments%20for%20IoT%20security%20enforcement&rft.jtitle=Journal%20of%20computer%20security&rft.au=Alam,%20Md%20Morshed&rft.date=2021-01-01&rft.volume=29&rft.issue=4&rft.spage=423&rft.epage=446&rft.pages=423-446&rft.issn=0926-227X&rft.eissn=1875-8924&rft_id=info:doi/10.3233/JCS-200108&rft_dat=%3Cproquest_cross%3E2542457410%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2542457410&rft_id=info:pmid/&rfr_iscdi=true